![Hands-On Penetration Testing with Kali NetHunter](https://wfqqreader-1252317822.image.myqcloud.com/cover/840/36698840/b_36698840.jpg)
上QQ阅读APP看书,第一时间看更新
BadUSB MITM attacks
By now, you've probably noticed that there are some amazing HID- and USB-based attacks on the Kali NetHunter platform. The BadUSB MITM Attack allows a penetration tester to simply use an OTG cable to create a physical connection between a victim's computer and the NetHunter device. Once a connection has been established, all network traffic leaving the victim computer will be sent to the NetHunter device:
![](https://epubservercos.yuewen.com/60E4A5/19470381301503306/epubprivate/OEBPS/Images/f9239788-9583-4cfd-9c54-c306b8df8ab4.jpg?sign=1738791572-i2tcv06bTB8gAkCIApWT86HUQgwKtagv-0-996e9f1a236345c680bf32d65e2e9cc1)
This type of attack is called a man-in-the-middle (MITM) attack as the NetHunter device implants itself between the victim's computer and the internet or any other network it is transmitting data on.